

All other traffic such as instant messaging, email, or casual browsing is sent out to the Internet via the local LAN of the VPN Client. Split tunneling can work to alleviate this problem since it allows users to send only that traffic which is destined for the corporate network across the tunnel. Based on your configuration and the number of users supported, such a set up can become bandwidth intensive. In a basic VPN Client to ASA scenario, all traffic from the VPN Client is encrypted and sent to the ASA no matter what its destination is. Refer to the Cisco Technical Tips Conventions for more information on document conventions. This configuration can also be used with Cisco PIX 500 Series Security Appliance Software version 7.x. The VPN Client is located on a typical SOHO network and connects across the Internet to the main office. If your network is live, make sure that you understand the potential impact of any command. All of the devices used in this document started with a cleared (default) configuration.

The information in this document was created from the devices in a specific lab environment. Note: This document also contains the PIX 6.x CLI configuration that is compatible for the Cisco VPN client 3.x. The information in this document is based on these software and hardware versions:Ĭisco ASA 5500 Series Security Appliance Software version 7.x and later Refer to PIX/ASA 7.x as a Remote VPN Server using ASDM Configuration Example if one is not already configured. This document assumes that a working remote access VPN configuration already exists on the ASA. Refer to PIX/ASA 7.x: Allow Local LAN Access for VPN Clients Configuration Example for more information.
#Cisco vpn client allow local lan access full
A compromise between full tunneling and split tunneling allows VPN Clients local LAN access only. Note: Full tunneling is considered the most secure configuration because it does not enable simultaneous device access to both the Internet and the corporate LAN.

This configuration allows VPN Clients secure access to corporate resources via IPsec while giving unsecured access to the Internet.
#Cisco vpn client allow local lan access how to
This document provides step-by-step instructions on how to allow VPN Clients access to the Internet while they are tunneled into a Cisco Adaptive Security Appliance (ASA) 5500 Series Security Appliance.
